Search dblp for Publications

export results for "toc:db/conf/auisc/auisc2011.bht:"

 download as .bib file

@inproceedings{DBLP:conf/auisc/AgnesseP11,
  author       = {Andrea Agnesse and
                  Marco Pedicini},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Cube Attack in Finite Fields of Higher Order},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {9--14},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Agnesse.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/AgnesseP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/BaiK11,
  author       = {Yun Bai and
                  Khaled M. Khan},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {A Modal Logic for Information System Security},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {51--56},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Bai.html},
  timestamp    = {Tue, 28 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/BaiK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/CampbellCL11,
  author       = {Scott Campbell and
                  Steve Chan and
                  Jason Lee},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Detection of Fast Flux Service Networks},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {57--66},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Campbell.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/CampbellCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/CorneyMC11,
  author       = {Malcolm Corney and
                  George M. Mohay and
                  Andrew J. Clark},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Detection of Anomalies from User Profiles Generated from System Logs},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {23--32},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Corney.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/CorneyMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/KaosarPY11,
  author       = {Md. Golam Kaosar and
                  Russell Paulet and
                  Xun Yi},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Secure Two-Party Association Rule Mining},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {15--22},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Kaosar.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/KaosarPY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/LacknerT11,
  author       = {G{\"{u}}nther Lackner and
                  Peter Teufl},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {{IEEE} 802.11 Chipset Fingerprinting by the Measurement of Timing
                  Characteristics},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {41--50},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Lackner.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/LacknerT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/LeWGK11,
  author       = {Van Lam Le and
                  Ian Welch and
                  Xiaoying Gao and
                  Peter Komisarczuk},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Identification of Potential Malicious Web Pages},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {33--40},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Le.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/LeWGK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/NakamuraIBIY11,
  author       = {Toru Nakamura and
                  Shunsuke Inenaga and
                  Kensuke Baba and
                  Daisuke Ikeda and
                  Hiroto Yasuura},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {An Anonymous Authentication Protocol with Single-database {PIR}},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {3--8},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Nakamura.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/NakamuraIBIY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/PalmerBW11,
  author       = {Ben Palmer and
                  Kris Bubendorfer and
                  Ian Welch},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Development and Evaluation of a Secure, Privacy Preserving Combinatorial
                  Auction},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {67--76},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Palmer.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/PalmerBW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/RiesSP11,
  author       = {Thorsten Ries and
                  Radu State and
                  Andriy Panchenko},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Comparison of Low-Latency Anonymous Communication Systems - Practical
                  Usage and Performance},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {77--86},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Ries.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/RiesSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/auisc/2011,
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/Vol116.html},
  isbn         = {978-1-920682-96-5},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics